WO2020000707A1 - Anti-fake method and system based on block chain, computer device, and storage medium - Google Patents

Anti-fake method and system based on block chain, computer device, and storage medium Download PDF

Info

Publication number
WO2020000707A1
WO2020000707A1 PCT/CN2018/106690 CN2018106690W WO2020000707A1 WO 2020000707 A1 WO2020000707 A1 WO 2020000707A1 CN 2018106690 W CN2018106690 W CN 2018106690W WO 2020000707 A1 WO2020000707 A1 WO 2020000707A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
blockchain
data
product
node
Prior art date
Application number
PCT/CN2018/106690
Other languages
French (fr)
Chinese (zh)
Inventor
张爽
王义文
王健宗
肖京
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2020000707A1 publication Critical patent/WO2020000707A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Definitions

  • the present application relates to the field of information technology, and in particular, to a method, a system, a computer device, and a storage medium based on a blockchain for anti-counterfeiting.
  • a blockchain-based anti-counterfeiting method includes: a preset product identifier, which is used as a blockchain data collector to record and monitor commodity information; and uses the blockchain to store the commodity information at the data layer And encryption; realize the interaction between nodes through the blockchain network layer, which contains a plurality of service nodes, each service node interacts by sending messages, and establishes nodes and nodes at the blockchain network layer
  • the consensus mechanism between them provides decentralization for digital content interaction and provides guarantee for data point-to-point transmission verification.
  • each node is promoted to reach a consensus at the blockchain consensus layer, and all the on-chain data is recorded separately and maintained The data states are consistent.
  • the proof-of-work mechanism is that when a node records data, its recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
  • a blockchain-based anti-counterfeiting system includes:
  • the preset unit is configured to preset a product identifier, which is used as a data collector of the blockchain to record and monitor product information;
  • a storage encryption unit configured to store and encrypt the commodity information at a data layer using a blockchain
  • the interaction verification unit is configured to realize interaction between nodes through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending a message, and is established at the blockchain network layer
  • Node-to-node consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification;
  • a consensus unit is set up to promote consensus among nodes on the blockchain consensus layer through a proof-of-work mechanism, record all on-chain data and keep all data states consistent.
  • the proof-of-work mechanism is when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
  • the viewing unit is configured to receive a product information viewing request sent by the user terminal, where the product information includes a product identifier of the product, and return the product information to the user terminal.
  • a computer device includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor causes the processor to perform the foregoing anti-counterfeiting based on blockchain technology. Method steps.
  • a storage medium storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, cause the one or more processors to execute the steps of the anti-counterfeiting method based on the blockchain technology.
  • the above-mentioned blockchain-based anti-counterfeiting method, system, computer equipment, and storage medium use preset commodity identifiers as the blockchain data collector to record and monitor commodity information, and collect commodity information through terminal detection of commodity identifiers. And transmitting the commodity information to the data layer of the blockchain.
  • the distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer.
  • Each block of the blockchain includes a block header and a block.
  • the block body includes all transaction information
  • the block header includes a hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time
  • the Merkel tree pairs transactions Perform verification, encrypt and decrypt the data with the public and private keys of the asymmetric encryption algorithm.
  • Each product ID contains a private key.
  • the private key is the password for viewing the product ID.
  • the node records the received data through P2P.
  • the network broadcasts to other accounting nodes in the decentralized server and waits for confirmation from other accounting nodes.
  • each node receives a message from a neighboring node, it If the information is valid, the node broadcasts the valid information to the neighboring nodes. If the information is invalid, the node does not perform any forwarding operation.
  • the chain consensus layer promotes each node to reach a consensus, record all on-chain data and keep all data states consistent.
  • the proof-of-work mechanism is that when a node records data, its recorded data needs to obtain most of the blockchain The node's approval can be recorded in each node of the blockchain.
  • the product information includes the product identification of the product, and returns the product information to the user terminal. It can be monitored in real time, and has unique identification and certification, so that it is convenient, fast and accurate to achieve luxury anti-counterfeiting.
  • FIG. 1 is a flowchart of a blockchain-based anti-counterfeiting method according to an embodiment
  • FIG. 2 is a schematic diagram of a P2P network mode in an embodiment
  • FIG. 3 is a flowchart of storing and encrypting commodity information in a data layer by using a blockchain in an embodiment
  • FIG. 4 is a flowchart of implementing the interaction between nodes through the blockchain network layer in an embodiment to provide decentralization for digital content interaction to provide guarantee for data point-to-point transmission verification;
  • FIG. 5 is a structural block diagram of a blockchain-based anti-counterfeiting system according to an embodiment
  • FIG. 6 is a structural block diagram of a storage encryption unit in an embodiment
  • FIG. 7 is a structural block diagram of an interactive verification unit in an embodiment.
  • a blockchain-based anti-counterfeiting method includes the following steps:
  • Step S101 preset a commodity identifier, which is used as a data collector of the blockchain to record and monitor commodity information;
  • This technical solution provides an anti-counterfeiting method based on blockchain technology. It uses NFC chips or RFID to mark product information to ensure the authenticity of the information. It uses the blockchain data layer to store and encrypt luxury information to complete the blockchain. Data information storage.
  • the P2P network layer implements decentralization.
  • the data verification mechanism synchronizes information across the entire network.
  • the PoW consensus mechanism determines which node obtains the block accounting right.
  • step S102 the commodity information is stored and encrypted at the data layer by using a blockchain
  • the product information data identified by the NFC chip, RFID or two-dimensional code will be transmitted to the data layer of the blockchain.
  • the blockchain data layer encapsulates the block data structure and encrypted content.
  • the block is composed of a block header and a block body.
  • the block body includes all transaction information.
  • the block header includes a hash value, a timestamp, and a Merkel tree root hash value. Among them, the timestamp records the block generation. Time, that is, transaction time, the Merkel tree enables fast verification of transactions. It is the only identifier for transactions in the block.
  • Merkle Tree also known as Hash Tree, is a tree that stores Hash values.
  • the leaves of the Merkel tree are the hash values of data blocks (for example, files or collections of files), and the non-leaf nodes are the hash of its concatenated string of child nodes.
  • Hash is a function that maps data of arbitrary length to fixed-length data.
  • step S103 the interaction between nodes is realized through a blockchain network layer.
  • the blockchain network layer includes a plurality of service nodes. Each service node interacts by sending messages, and the nodes and nodes are established at the blockchain network layer. The consensus mechanism between them provides decentralization for digital content interaction and provides guarantee for data point-to-point transmission verification;
  • a blockchain network layer which includes a plurality of service nodes, each service node interacts by sending messages, and establishes a node-to-node relationship at the blockchain network layer.
  • the consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification.
  • the decentralization problem is solved through the P2P network.
  • the network model is shown in Figure 2.
  • the P2P network uses a flat topology. The status of each node is the same. Without a centralized server, each node participates equally. Functions such as checksum broadcasting are the basis of the decentralized network implemented in this application.
  • the network layer includes a data check mechanism.
  • a node When a node receives a message from a neighboring node, it verifies the validity of the data. For valid information, this node broadcasts the information to the neighboring nodes. , To achieve the synchronization of the entire network message, and for invalid information, the node will not perform any forwarding operation. The function of immutable and traceable blockchain product information is realized through node verification.
  • Step S104 Promote each node to reach a consensus at the blockchain consensus layer through the proof-of-work mechanism, record all the on-chain data and keep all data states consistent.
  • the proof-of-work mechanism is that when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
  • the proof-of-work mechanism is the data recorded by a node when it records data Need to obtain the approval of most nodes in the blockchain in order to be recorded in each node of the blockchain.
  • This application uses a consensus mechanism based on proof-of-work PoW, so that a system with decentralized decision-making power can reach consensus.
  • Each node solves a mathematical problem through the competition of computing power.
  • the node that solves the problem the fastest will obtain the block accounting right that is, the data information is written into the blockchain by the miner who has obtained the block accounting right
  • brands or suppliers can write product information into the blockchain
  • intermediate channels can write logistics information into the blockchain and monitor it in real time.
  • the entire network is unified, the algorithm is simple, and it is easy to implement. Consensus can be reached by exchanging additional information, and disrupting the system requires significant costs.
  • PoW Proof of Work
  • proof of work Bitcoin uses the PoW mechanism in the block generation process.
  • a qualified Block Hash consists of N leading zeros, and the number of zeros depends on the difficulty of the network. To get a reasonable Block and Hash, it takes a lot of calculations, and the calculation time depends on the speed of the machine's hash operation.
  • a node provides a reasonable Block and Hash value, it shows that the node has indeed undergone a large number of attempts to calculate. Of course, the absolute value of the number of calculations cannot be obtained, because finding a reasonable hash is a probability event.
  • the node has n% of the computing power of the entire network, the node has a probability of n / 100 to find Block Hash.
  • Step S105 Receive a commodity information viewing request sent by the user terminal, where the commodity information includes a commodity identifier of the commodity, and return the commodity information to the user terminal.
  • using a blockchain to store and encrypt the commodity information at the data layer specifically includes:
  • Step S201 Detect a product identifier through a terminal, and transmit the product information to a data layer of a blockchain;
  • the product information data identified by the NFC chip, RFID or two-dimensional code will be transmitted to the data layer of the blockchain.
  • Step S202 The distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer.
  • Each block of the blockchain includes a block header and a block body, and the block body includes all transaction information.
  • the block header includes a hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time, and the Merkel tree verifies a transaction;
  • the blockchain data layer in the distributed ledger database encapsulates the block data structure and encrypted content.
  • the block is composed of a block header and a block body.
  • the block body includes all transaction information.
  • the block header includes a hash value, a timestamp, and a Merkel tree root hash value. Among them, the timestamp records the block generation.
  • Time that is, transaction time
  • the Merkel tree enables fast verification of transactions. It is the only identifier for transactions in the block.
  • Merkle Tree also known as Hash Tree, is a tree that stores Hash values.
  • the leaves of a Merkel tree are the Hash values of data blocks (for example, files or collections of files). Non-leaf nodes It is a hash of its corresponding child node concatenated string.
  • Hash is a function that maps data of arbitrary length to fixed-length data.
  • step S203 the data is encrypted and decrypted by using the public key and the private key of the asymmetric encryption algorithm.
  • Each product identifier includes a private key, and the private key is a password for viewing the product identifier.
  • each chip has a private key.
  • the private key can be viewed as the password of the chip , The user must obtain the private key to have the right to view the chip information or modify the information, and the difficulty of cracking the private key password is quite complicated, requires supercomputing resources, and is almost impossible to achieve.
  • the interaction between nodes is realized through a blockchain network layer, which includes a plurality of service nodes, and each service node interacts by sending a message
  • the blockchain network layer establishes a consensus mechanism between nodes, provides decentralization for digital content interaction, and provides guarantee for data point-to-point transmission verification including:
  • Step S301 The node broadcasts the received data records to other accounting nodes in the decentralized server through the P2P network, and waits for confirmation from other accounting nodes;
  • Interaction between nodes is achieved through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending messages, and establishes a node-to-node relationship at the blockchain network layer.
  • the consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification.
  • the node broadcasts the received data records to other accounting nodes in the decentralized server through the P2P network, waiting for confirmation from other accounting nodes.
  • the decentralization problem is solved through the P2P network.
  • the P2P network uses a flat topology. The status of each node is the same. Without a centralized server, each node equally participates in functions such as checksum broadcast. This is This application implements a decentralized network foundation.
  • step S302 when each node receives a message from a neighboring node, it verifies the finiteness of the data. If it is valid information, the node broadcasts the valid information to the neighboring nodes. If it is invalid information, all nodes It is stated that the node does not perform any forwarding operation.
  • the network layer includes a data check mechanism.
  • a node receives a message from a neighboring node, it verifies the validity of the data. For valid information, this node broadcasts the information to the neighboring nodes. , To achieve the synchronization of the entire network message, and for invalid information, the node will not perform any forwarding operation.
  • the function of immutable and traceable blockchain product information is realized through node verification.
  • the product identification includes a two-dimensional code provided on the surface of the product identification, and / or an NFC chip and / or an RFID chip provided inside the product identification, and the product identification is bound to the product with the two-dimensional code, Both the NFC chip and the RFID chip include anti-counterfeit traceability result data and encrypted information data of the commodity.
  • the product identification includes a two-dimensional code provided on the surface of the product identification, and / or an NFC chip and / or an RFID chip provided inside the product identification, and the product identification is bound to the product with the two-dimensional code, the NFC chip and the The RFID chip contains the anti-counterfeit traceability result data and encrypted information data of the commodity.
  • NFC Near Field Communication
  • NFC short-range wireless communication in which the NFC chip is an important part of the NFC module, which has communication functions and certain computing capabilities. Some models even include encryption logic circuits and encryption / decryption modules.
  • NFC allows electronic devices to perform contactless point-to-point data transfers with each other. This technology evolved from the non-contact RFID technology, and is backward compatible with RFID technology. Because of its high security, NFC technology has great applications in mobile payments. NFC technology is to integrate the function of RFID card reader and RFID card, and provide compatibility for RFID devices.
  • RFID Radio Frequency Identification
  • RFID equipment has been applied to many fields such as IC card access control systems and bus cards are the products of RFID technology.
  • Two-dimensional code (2-dimensional bar code) records data symbol information with black and white graphics that are distributed on a plane (in a two-dimensional direction) with a certain geometric figure according to a certain rule.
  • the code is used to form the internal logic basis of the computer
  • the concept of "0" and "1" bitstreams uses several geometric shapes corresponding to binary to represent text numerical information. It is automatically read by image input equipment or photoelectric scanning equipment to realize automatic information processing. Each character occupies A certain width; it has a certain verification function, etc. At the same time, it also has an automatic recognition function for different rows of information, and handles the rotation point of graphics.
  • the product information includes manufacturer, warehousing, transshipment, distribution, distribution, transfer, and maintenance information.
  • the manufacturer information includes manufacturer authorization and time information.
  • the transfer information is used to check loading information and the maintenance information. Record maintenance or separate usage information according to the maintenance phase.
  • Product information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information.
  • Manufacturer information includes manufacturer authorization and time information.
  • Transshipment information is used to check loading information, maintenance information records maintenance, or records usage information separately according to the maintenance stage.
  • Product information management is a new type of integrated management that integrates logistics activities such as information, transportation, warehousing, inventory, loading and unloading, and packaging. Its main task is to reduce logistics costs as much as possible and provide customers with more efficiency and convenience. Services, specific business types are becoming more and more diversified, including various functions such as transportation, warehousing, loading and unloading, packaging, distribution processing, and logistics information processing.
  • a blockchain-based anti-counterfeiting system As shown in FIG. 5, in one embodiment, a blockchain-based anti-counterfeiting system is provided.
  • the blockchain-based anti-counterfeiting system includes:
  • the preset unit is configured to preset a product identifier, which is used as a data collector of the blockchain to record and monitor product information;
  • a storage encryption unit configured to store and encrypt the commodity information at a data layer using a blockchain
  • the interaction verification unit is configured to realize interaction between nodes through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending a message, and is established at the blockchain network layer
  • Node-to-node consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification;
  • a consensus unit is set up to promote consensus among nodes on the blockchain consensus layer through a proof-of-work mechanism, record all on-chain data and keep all data states consistent.
  • the proof-of-work mechanism is when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
  • the viewing unit is configured to receive a product information viewing request sent by the user terminal, where the product information includes a product identifier of the product, and return the product information to the user terminal.
  • the product identifier includes a two-dimensional code provided on a surface of the product identifier, and / or an NFC chip and / or an RFID chip provided inside the product identifier, and the product identifier is bound to the product by the two-dimensional code.
  • Both the NFC chip and the RFID chip include anti-counterfeit traceability result data and encrypted information data of commodities.
  • the product information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information
  • the manufacturer information includes manufacturer authorization and time information
  • the transfer information is used to check loading information
  • the Maintenance information records maintenance or separate usage information according to the maintenance phase.
  • the storage encryption unit further includes:
  • the collection and transmission module is configured to detect the product identification through the terminal and transmit the collected product information to the data layer of the blockchain;
  • the encapsulation module is configured to make the distributed ledger database encapsulate the blockchain data structure and encrypted content in the blockchain data layer.
  • Each block of the blockchain includes a block header and a block body.
  • the block body includes all Transaction information
  • the block header includes a hash value, a timestamp, and a Merkel tree root hash value
  • the timestamp records the block generation time
  • the Merkel tree verifies the transaction;
  • the encryption and decryption module is configured to encrypt and decrypt data by using a public encryption key and a private key of an asymmetric encryption algorithm.
  • Each product identifier includes a private key, and the private key is a password for viewing the product identifier.
  • the acquisition and transmission module includes: a product information data acquisition module configured to identify product information data through an NFC chip, RFID or two-dimensional code; and a product information data transmission module configured to identify the identified information.
  • the information data is transmitted to the data layer of the blockchain.
  • the interactive verification unit further includes:
  • a broadcasting module configured to enable a node to broadcast received data records to other accounting nodes in a decentralized server through a P2P network, and wait for confirmation from other accounting nodes;
  • the verification module is configured to verify the finiteness of the data when each node receives a message from a neighboring node. If it is valid information, the node broadcasts the valid information to neighboring nodes, and if it is invalid information It is said that the node does not perform any forwarding operation.
  • a computer device in one embodiment, includes a memory and a processor.
  • the memory stores computer-readable instructions.
  • the processor causes the processor to execute the foregoing embodiments. Steps in the anti-counterfeiting method based on blockchain technology.
  • a storage medium storing computer-readable instructions.
  • the computer-readable instructions are executed by one or more processors, the one or more processors are caused to execute all the steps in the foregoing embodiments.
  • the steps of the anti-counterfeiting method based on blockchain technology are described.
  • the storage medium may be a non-volatile storage medium.
  • the program may be stored in a computer-readable storage medium.
  • the storage medium may include: Read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks, etc.

Abstract

An anti-fake method and system based on a block chain, a computer device, and a storage medium, wherein the method comprises: presetting a commodity identification, the commodity identification being used as a data collector of the block chain to record and monitor commodity information (S101); storing and encrypting the commodity information in a data layer by using the block chain (S102); implementing interaction between nodes by means of a block chain network layer, providing decentralization for digital content interaction, and providing guarantee for verification of data point-to-point transmission (S103); by means of a workload proof mechanism, promoting the nodes to reach consensus in a block chain consensus layer (S104); and receiving a commodity information viewing request sent by a user terminal, the commodity information comprising a commodity identification of a commodity, and returning the commodity information to the user terminal (S105). The method enables luxury goods to be monitored in real time after the luxury goods leave a factory, and provides unique identification and authentication, so as to conveniently, quickly, and accurately implement the anti-fake of the luxury goods.

Description

基于区块链的防伪方法、系统、计算机设备和存储介质Anti-counterfeiting method, system, computer equipment and storage medium based on blockchain
本申请要求于2018年06月25日提交中国专利局、申请号为201810656985.1、发明名称为“基于区块链的防伪方法、系统、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of a Chinese patent application filed on June 25, 2018 with the application number 201810656985.1 and the invention name "blockchain-based anti-counterfeiting method, system, computer equipment and storage medium", all of which are The contents are incorporated herein by reference.
技术领域Technical field
本申请涉及信息技术领域,尤其涉及一种基于区块链的防伪方法、系统、计算机设备和存储介质。The present application relates to the field of information technology, and in particular, to a method, a system, a computer device, and a storage medium based on a blockchain for anti-counterfeiting.
背景技术Background technique
假货盛行一直是是长期困扰奢侈品品牌方的大难题,目前,国内没有权威的第三方奢侈品鉴别真伪机构,因此大部分奢侈品鉴定工作都是靠有经验的人力完成,通常需要耗费较长时间和高昂的鉴定费用,而有一些奢侈品牌方采用的独一无二的产品序号,“唯一码”等方式,也依旧存在序列号伪造,普通用户无法鉴别的问题。防伪是为了商品不被假冒商家仿造和伪造,如果假冒厂家打着某某品牌的产品旗号,这样对于真正商品品牌来说是具有非常大的影响,不管在什么时候,假冒商品质量肯定是比不上原品牌商品,质量决定企业信誉,如果一个商品被假冒,这难免会给企业造成难以弥补的影响。尤其是大的企业品牌,如果被假冒,没有得到很好的管理,给企业带来的经营风险是非常致命的。现有的防伪技术主要存在如下缺陷:The prevalence of counterfeit goods has always been a big problem for luxury brands. At present, there is no authoritative third-party luxury goods identification agency in China. Therefore, most of the luxury goods identification work is done by experienced personnel, which usually costs For a long time and high appraisal costs, there are still some unique brand serial numbers, "unique codes" and other methods adopted by luxury brands, and there are still problems with counterfeit serial numbers that ordinary users cannot identify. Anti-counterfeiting is to prevent the goods from being counterfeited and counterfeited by counterfeit merchants. If the counterfeit manufacturers use the brand name of a certain brand, this will have a great impact on the real brand. Uehara brand products, quality determines corporate credibility, if a product is counterfeited, this will inevitably cause an irreparable impact on the enterprise. Especially for large corporate brands, if they are counterfeited and not well managed, the business risks to the enterprise are very fatal. The existing anti-counterfeiting technologies mainly have the following defects:
1、奢侈品出厂后无法得到实时监控;1. Luxury goods cannot be monitored in real time after leaving the factory;
2、无追溯性,环节依赖度高,依赖专家认证,无法方便准确的实现奢侈品防伪;2. No traceability, high dependency on links and reliance on expert certification, it is not convenient to accurately realize luxury anti-counterfeiting;
3、现有防伪标识没有附加信息或者附加信息太少。3. There is no additional information or too little additional information on the existing anti-counterfeiting marks.
发明内容Summary of the invention
基于此,有必要针对现行商品防伪方法的弊端,提供一种基于区块链的防伪方法、系统、计算机设备和存储介质。Based on this, it is necessary to provide a blockchain-based anti-counterfeiting method, system, computer equipment and storage medium in view of the disadvantages of the current anti-counterfeiting methods of commodities.
一种基于区块链的防伪方法,包括:预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;采用区块链在数据层对所述商品信息进行存储和加密;通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据 点对点传输进行验证提供保障;通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;A blockchain-based anti-counterfeiting method includes: a preset product identifier, which is used as a blockchain data collector to record and monitor commodity information; and uses the blockchain to store the commodity information at the data layer And encryption; realize the interaction between nodes through the blockchain network layer, which contains a plurality of service nodes, each service node interacts by sending messages, and establishes nodes and nodes at the blockchain network layer The consensus mechanism between them provides decentralization for digital content interaction and provides guarantee for data point-to-point transmission verification. Through the proof-of-work mechanism, each node is promoted to reach a consensus at the blockchain consensus layer, and all the on-chain data is recorded separately and maintained The data states are consistent. The proof-of-work mechanism is that when a node records data, its recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。Receiving a commodity information viewing request sent by a user terminal, where the commodity information includes a commodity identifier of the commodity, and returning the commodity information to the user terminal.
一种基于区块链的防伪系统,包括:A blockchain-based anti-counterfeiting system includes:
预置单元,设置为预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;The preset unit is configured to preset a product identifier, which is used as a data collector of the blockchain to record and monitor product information;
存储加密单元,设置为采用区块链在数据层对所述商品信息进行存储和加密;A storage encryption unit configured to store and encrypt the commodity information at a data layer using a blockchain;
交互验证单元,设置为通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;The interaction verification unit is configured to realize interaction between nodes through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending a message, and is established at the blockchain network layer Node-to-node consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification;
共识单元,设置为通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;A consensus unit is set up to promote consensus among nodes on the blockchain consensus layer through a proof-of-work mechanism, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
查看单元,设置为接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。The viewing unit is configured to receive a product information viewing request sent by the user terminal, where the product information includes a product identifier of the product, and return the product information to the user terminal.
一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行上述基于区块链技术的防伪方法的步骤。A computer device includes a memory and a processor. The memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the processor causes the processor to perform the foregoing anti-counterfeiting based on blockchain technology. Method steps.
一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述基于区块链技术的防伪方法的步骤。A storage medium storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, cause the one or more processors to execute the steps of the anti-counterfeiting method based on the blockchain technology.
上述基于区块链的防伪方法、系统、计算机设备和存储介质,通过预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息,通过终端检测商品标识采集商品信息,并将所述商品信息传输到区块链的数据层, 分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验,通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码,节点将收到的数据记录通过P2P网络广播到去中心化服务器中的其他记账节点,等待其他记账节点的确认,当每个节点收到临近节点传来的消息时,对数据的有限性进行验证,若为有效信息,所述节点将该有效信息向临近的节点进行广播,若为无效信息,所述,所述节点不进行任何转发操作,通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中,接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息,让奢侈品出厂后可以实时监控,并具有唯一性的识别认证,从而方便,快捷,准确的实现奢侈品防伪。The above-mentioned blockchain-based anti-counterfeiting method, system, computer equipment, and storage medium use preset commodity identifiers as the blockchain data collector to record and monitor commodity information, and collect commodity information through terminal detection of commodity identifiers. And transmitting the commodity information to the data layer of the blockchain. The distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block. The block body includes all transaction information, the block header includes a hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time, and the Merkel tree pairs transactions Perform verification, encrypt and decrypt the data with the public and private keys of the asymmetric encryption algorithm. Each product ID contains a private key. The private key is the password for viewing the product ID. The node records the received data through P2P. The network broadcasts to other accounting nodes in the decentralized server and waits for confirmation from other accounting nodes. When each node receives a message from a neighboring node, it If the information is valid, the node broadcasts the valid information to the neighboring nodes. If the information is invalid, the node does not perform any forwarding operation. The chain consensus layer promotes each node to reach a consensus, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is that when a node records data, its recorded data needs to obtain most of the blockchain The node's approval can be recorded in each node of the blockchain. It receives a request for viewing the product information sent by the user terminal. The product information includes the product identification of the product, and returns the product information to the user terminal. It can be monitored in real time, and has unique identification and certification, so that it is convenient, fast and accurate to achieve luxury anti-counterfeiting.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本申请的限制。Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the detailed description of the preferred embodiments below. The drawings are only for the purpose of illustrating preferred embodiments and are not to be considered as limiting the present application.
图1为一个实施例中基于区块链的防伪方法的流程图;FIG. 1 is a flowchart of a blockchain-based anti-counterfeiting method according to an embodiment; FIG.
图2为一个实施例中P2P网络模式示意图;2 is a schematic diagram of a P2P network mode in an embodiment;
图3为一个实施例中采用区块链在数据层对商品信息进行存储和加密的流程图;3 is a flowchart of storing and encrypting commodity information in a data layer by using a blockchain in an embodiment;
图4为一个实施例中通过区块链网络层实现节点之间的交互为数字内容交互提供去中心化对数据点对点传输进行验证提供保障的流程图;FIG. 4 is a flowchart of implementing the interaction between nodes through the blockchain network layer in an embodiment to provide decentralization for digital content interaction to provide guarantee for data point-to-point transmission verification;
图5为一个实施例中基于区块链的防伪系统的结构框图;5 is a structural block diagram of a blockchain-based anti-counterfeiting system according to an embodiment;
图6为一个实施例中存储加密单元的结构框图;6 is a structural block diagram of a storage encryption unit in an embodiment;
图7为一个实施例中交互验证单元的结构框图。FIG. 7 is a structural block diagram of an interactive verification unit in an embodiment.
具体实施方式detailed description
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the purpose, technical solution, and advantages of the present application clearer, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the application, and are not used to limit the application.
本技术领域技术人员可以理解,除非特意声明,这里使用的单数形式“一”、“一个”、“所述”和“该”也可包括复数形式。应该进一步理解的是,本申请的说明书中使用的措辞“包括”是指存在所述特征、整数、步骤、操作、元件和/或组件,但是并不排除存在或添加一个或多个其他特征、整数、步骤、操作、元件、组件和/或它们的组。Those skilled in the art will understand that, unless specifically stated otherwise, the singular forms "a", "an", "the" and "the" may include plural forms. It should be further understood that the word "comprising" used in the specification of the present application refers to the presence of the described features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof.
作为一个较好的实施例,如图1所示,一种基于区块链的防伪方法,该基于区块链的防伪方法包括以下步骤:As a better embodiment, as shown in FIG. 1, a blockchain-based anti-counterfeiting method includes the following steps:
步骤S101,预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;Step S101: preset a commodity identifier, which is used as a data collector of the blockchain to record and monitor commodity information;
本技术方案提供了一种基于区块链技术的防伪方法,通过NFC芯片或RFID来标记商品信息,保障信息真实准确性,通过区块链数据层进行奢侈品信息存储和加密,完成区块链数据信息存储,P2P网络层实现去中心化功能,数据校验机制实现全网信息的同步,PoW共识机制来决策哪个节点获得区块记账权利。This technical solution provides an anti-counterfeiting method based on blockchain technology. It uses NFC chips or RFID to mark product information to ensure the authenticity of the information. It uses the blockchain data layer to store and encrypt luxury information to complete the blockchain. Data information storage. The P2P network layer implements decentralization. The data verification mechanism synchronizes information across the entire network. The PoW consensus mechanism determines which node obtains the block accounting right.
首先在每个奢侈品内放置一个唯一的、独立的NFC芯片,对于一些附加值不太高的商品,可以使用二维码或者射频识别RFID来标记,这些识别芯片可以理解为商品的电子“身份证”,从商品制作、生产开始,每件商品经过的渠道不一样,形成的信息就会不一样,芯片作为区块链的数据采集器,对商品的所有物流、仓储、转手等信息进行记录和监控,从而保证奢侈品数据信息的真实性。。First, place a unique, independent NFC chip in each luxury product. For some products with low added value, you can use two-dimensional code or radio frequency identification RFID to mark them. These identification chips can be understood as the electronic "identity" of the product. Certification ", starting from the production and production of goods, each product goes through different channels, and the information formed will be different. The chip acts as a blockchain data collector and records all the goods' logistics, warehousing, and resale information. And monitoring to ensure the authenticity of luxury data information. .
步骤S102,采用区块链在数据层对所述商品信息进行存储和加密;In step S102, the commodity information is stored and encrypted at the data layer by using a blockchain;
通过NFC芯片、RFID或者二维码识别的产品信息数据,会传输到区块链的数据层。包括奢侈品在完整商业周期中的流转情况,例如奢侈品的生产过程、物流过程等。其中,区块链数据层封装了区块数据结构和加密内容。区块由区块头和区块体构成,区块体包括了所有的交易信息,区块头包括哈希值,时间戳,默克尔树根哈希值等,其中,时间戳记录区块生成的时间,即交易时间,默克尔树实现交易的快速校验,它是对区块体中交易的唯一标识。同时在加密方面,依靠数字签名和非对称加密算法来保障数据的安全性,通过公钥和私钥 对数据加密和解密,每一个芯片都有私钥,私钥可以看作是查看芯片的密码,使用者必须获得私钥才有权限查看芯片信息或修改信息,而破解私钥密码的难度相当复杂,需要超级计算资源,几乎无法实现。默克尔树(Merkle Tree),也被称作Hash Tree,就是存储Hash值的一棵树。默克尔树的叶子是数据块(例如,文件或者文件的集合)的Hash值,非叶节点是其对应子节点串联字符串的Hash。Hash是一个把任意长度的数据映射成固定长度数据的函数。The product information data identified by the NFC chip, RFID or two-dimensional code will be transmitted to the data layer of the blockchain. Including the circulation of luxury goods in the complete business cycle, such as the production process of luxury goods, logistics processes, and so on. Among them, the blockchain data layer encapsulates the block data structure and encrypted content. The block is composed of a block header and a block body. The block body includes all transaction information. The block header includes a hash value, a timestamp, and a Merkel tree root hash value. Among them, the timestamp records the block generation. Time, that is, transaction time, the Merkel tree enables fast verification of transactions. It is the only identifier for transactions in the block. At the same time, in terms of encryption, rely on digital signatures and asymmetric encryption algorithms to ensure data security. The data is encrypted and decrypted through public and private keys. Each chip has a private key. The private key can be viewed as the password of the chip. , The user must obtain the private key to have the right to view the chip information or modify the information, and the difficulty of cracking the private key password is quite complicated, requires supercomputing resources, and is almost impossible to achieve. Merkle Tree, also known as Hash Tree, is a tree that stores Hash values. The leaves of the Merkel tree are the hash values of data blocks (for example, files or collections of files), and the non-leaf nodes are the hash of its concatenated string of child nodes. Hash is a function that maps data of arbitrary length to fixed-length data.
步骤S103,通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;In step S103, the interaction between nodes is realized through a blockchain network layer. The blockchain network layer includes a plurality of service nodes. Each service node interacts by sending messages, and the nodes and nodes are established at the blockchain network layer. The consensus mechanism between them provides decentralization for digital content interaction and provides guarantee for data point-to-point transmission verification;
通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障。首先通过P2P网络来解决去中心化问题,其网络模式如图2所示,P2P网络采用的是扁平式拓扑结构,各个节点的地位是一样的,没有中心化服务器,每个节点都平等的参与校验和广播等功能,这是本申请实现去中心化的网络基础。其次,网络层中包括数据校验机制,当某个节点收到临近节点传来的消息时,会对数据的有效性进行验证,对于有效信息,此节点会将该信息向临近的节点进行广播,实现整个网络消息的同步,而对于无效的信息,节点不会进行任何转发操作。通过节点验证实现了区块链产品信息不可篡改,可以追溯的功能。Interaction between nodes is achieved through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending messages, and establishes a node-to-node relationship at the blockchain network layer. The consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification. First, the decentralization problem is solved through the P2P network. The network model is shown in Figure 2. The P2P network uses a flat topology. The status of each node is the same. Without a centralized server, each node participates equally. Functions such as checksum broadcasting are the basis of the decentralized network implemented in this application. Second, the network layer includes a data check mechanism. When a node receives a message from a neighboring node, it verifies the validity of the data. For valid information, this node broadcasts the information to the neighboring nodes. , To achieve the synchronization of the entire network message, and for invalid information, the node will not perform any forwarding operation. The function of immutable and traceable blockchain product information is realized through node verification.
步骤S104,通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;Step S104: Promote each node to reach a consensus at the blockchain consensus layer through the proof-of-work mechanism, record all the on-chain data and keep all data states consistent. The proof-of-work mechanism is that when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中。在去中心化的系统中,如何使节点达成共识是关键。本申请采用了基于工作量证明PoW的共识机制,从而让决策权分散的系统达成一致。 各个节点通过算力竞争来共同解决一个数学问题,最快解决该难题的节点将获得区块记账权利(即数据信息由获得区块记账权的矿工写入区块链),并对最快解决出来的节点进行全网广播。基于共识层,品牌商或者供货商可以将产品信息写入区块链中,中间渠道可以将物流信息写入区块链并进行实时监控,全网统一,算法简单,容易实现,节点间无需交换额外的信息即可达成共识,破坏系统需要投入极大的成本。Promote each node to reach consensus at the blockchain consensus layer through the proof-of-work mechanism, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is the data recorded by a node when it records data Need to obtain the approval of most nodes in the blockchain in order to be recorded in each node of the blockchain. In a decentralized system, how to make nodes reach consensus is the key. This application uses a consensus mechanism based on proof-of-work PoW, so that a system with decentralized decision-making power can reach consensus. Each node solves a mathematical problem through the competition of computing power. The node that solves the problem the fastest will obtain the block accounting right (that is, the data information is written into the blockchain by the miner who has obtained the block accounting right), and The quickly resolved nodes broadcast across the network. Based on the consensus layer, brands or suppliers can write product information into the blockchain, and intermediate channels can write logistics information into the blockchain and monitor it in real time. The entire network is unified, the algorithm is simple, and it is easy to implement. Consensus can be reached by exchanging additional information, and disrupting the system requires significant costs.
PoW(Proof of Work),工作量证明,比特币在Block的生成过程中使用了PoW机制,一个符合要求的Block Hash由N个前导零构成,零的个数取决于网络的难度值。要得到合理的Block Hash需要经过大量尝试计算,计算时间取决于机器的哈希运算速度。当某个节点提供出一个合理的Block Hash值,说明该节点确实经过了大量的尝试计算,当然,并不能得出计算次数的绝对值,因为寻找合理Hash是一个概率事件。当节点拥有占全网n%的算力时,该节点即有n/100的概率找到Block Hash。PoW (Proof of Work), proof of work, Bitcoin uses the PoW mechanism in the block generation process. A qualified Block Hash consists of N leading zeros, and the number of zeros depends on the difficulty of the network. To get a reasonable Block and Hash, it takes a lot of calculations, and the calculation time depends on the speed of the machine's hash operation. When a node provides a reasonable Block and Hash value, it shows that the node has indeed undergone a large number of attempts to calculate. Of course, the absolute value of the number of calculations cannot be obtained, because finding a reasonable hash is a probability event. When a node has n% of the computing power of the entire network, the node has a probability of n / 100 to find Block Hash.
步骤S105,接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。Step S105: Receive a commodity information viewing request sent by the user terminal, where the commodity information includes a commodity identifier of the commodity, and return the commodity information to the user terminal.
在保证奢侈品信息不可篡改和安全性的基础上,消费者通过智能终端APP,可以直接查看所购商品在上游每个流程节点的信息,得知该商品的“历史”,读取到奢侈品在整个供应链中的流程信息。On the basis of ensuring that the luxury information is immutable and secure, consumers can directly view the information of each process node of the purchased product upstream through the smart terminal APP, learn the "history" of the product, and read the luxury product. Process information throughout the supply chain.
如图3所示,在一个实施例中,采用区块链在数据层对所述商品信息进行存储和加密具体包括:As shown in FIG. 3, in one embodiment, using a blockchain to store and encrypt the commodity information at the data layer specifically includes:
步骤S201,通过终端检测商品标识,并将所述商品信息传输到区块链的数据层;Step S201: Detect a product identifier through a terminal, and transmit the product information to a data layer of a blockchain;
通过NFC芯片、RFID或者二维码识别的产品信息数据,会传输到区块链的数据层。包括奢侈品在完整商业周期中的流转情况,例如奢侈品的生产过程、物流过程等。The product information data identified by the NFC chip, RFID or two-dimensional code will be transmitted to the data layer of the blockchain. Including the circulation of luxury goods in the complete business cycle, such as the production process of luxury goods, logistics processes, and so on.
步骤S202,分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验;Step S202: The distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block body, and the block body includes all transaction information. The block header includes a hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time, and the Merkel tree verifies a transaction;
其中,分布式账本数据库中区块链数据层封装了区块数据结构和加密内容。 区块由区块头和区块体构成,区块体包括了所有的交易信息,区块头包括哈希值,时间戳,默克尔树根哈希值等,其中,时间戳记录区块生成的时间,即交易时间,默克尔树实现交易的快速校验,它是对区块体中交易的唯一标识。默克尔树(Merkle Tree),也被称作Hash Tree,就是存储Hash值的一棵树,默克尔树的叶子是数据块(例如,文件或者文件的集合)的Hash值,非叶节点是其对应子节点串联字符串的Hash,Hash是一个把任意长度的数据映射成固定长度数据的函数。Among them, the blockchain data layer in the distributed ledger database encapsulates the block data structure and encrypted content. The block is composed of a block header and a block body. The block body includes all transaction information. The block header includes a hash value, a timestamp, and a Merkel tree root hash value. Among them, the timestamp records the block generation. Time, that is, transaction time, the Merkel tree enables fast verification of transactions. It is the only identifier for transactions in the block. Merkle Tree, also known as Hash Tree, is a tree that stores Hash values. The leaves of a Merkel tree are the Hash values of data blocks (for example, files or collections of files). Non-leaf nodes It is a hash of its corresponding child node concatenated string. Hash is a function that maps data of arbitrary length to fixed-length data.
步骤S203,通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码。In step S203, the data is encrypted and decrypted by using the public key and the private key of the asymmetric encryption algorithm. Each product identifier includes a private key, and the private key is a password for viewing the product identifier.
同时在加密方面,依靠数字签名和非对称加密算法来保障数据的安全性,通过公钥和私钥对数据加密和解密,每一个芯片都有私钥,私钥可以看作是查看芯片的密码,使用者必须获得私钥才有权限查看芯片信息或修改信息,而破解私钥密码的难度相当复杂,需要超级计算资源,几乎无法实现。At the same time, in terms of encryption, rely on digital signatures and asymmetric encryption algorithms to ensure data security. The data is encrypted and decrypted through public and private keys. Each chip has a private key. The private key can be viewed as the password of the chip , The user must obtain the private key to have the right to view the chip information or modify the information, and the difficulty of cracking the private key password is quite complicated, requires supercomputing resources, and is almost impossible to achieve.
如图4所示,在一个实施例中,通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障包括:As shown in FIG. 4, in one embodiment, the interaction between nodes is realized through a blockchain network layer, which includes a plurality of service nodes, and each service node interacts by sending a message, and The blockchain network layer establishes a consensus mechanism between nodes, provides decentralization for digital content interaction, and provides guarantee for data point-to-point transmission verification including:
步骤S301,节点将收到的数据记录通过P2P网络广播到去中心化服务器中的其他记账节点,等待其他记账节点的确认;Step S301: The node broadcasts the received data records to other accounting nodes in the decentralized server through the P2P network, and waits for confirmation from other accounting nodes;
通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障。节点将收到的数据记录通过P2P网络广播到去中心化服务器中的其他记账节点,等待其他记账节点的确认。首先通过P2P网络来解决去中心化问题,P2P网络采用的是扁平式拓扑结构,各个节点的地位是一样的,没有中心化服务器,每个节点都平等的参与校验和广播等功能,这是本申请实现去中心化的网络基础。Interaction between nodes is achieved through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending messages, and establishes a node-to-node relationship at the blockchain network layer. The consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification. The node broadcasts the received data records to other accounting nodes in the decentralized server through the P2P network, waiting for confirmation from other accounting nodes. First, the decentralization problem is solved through the P2P network. The P2P network uses a flat topology. The status of each node is the same. Without a centralized server, each node equally participates in functions such as checksum broadcast. This is This application implements a decentralized network foundation.
步骤S302,当每个节点收到临近节点传来的消息时,对数据的有限性进行验证,若为有效信息,所述节点将该有效信息向临近的节点进行广播,若为无效信息,所述,所述节点不进行任何转发操作。In step S302, when each node receives a message from a neighboring node, it verifies the finiteness of the data. If it is valid information, the node broadcasts the valid information to the neighboring nodes. If it is invalid information, all nodes It is stated that the node does not perform any forwarding operation.
其次,网络层中包括数据校验机制,当某个节点收到临近节点传来的消息时,会对数据的有效性进行验证,对于有效信息,此节点会将该信息向临近的节点进行广播,实现整个网络消息的同步,而对于无效的信息,节点不会进行任何转发操作。通过节点验证实现了区块链产品信息不可篡改,可以追溯的功能。Second, the network layer includes a data check mechanism. When a node receives a message from a neighboring node, it verifies the validity of the data. For valid information, this node broadcasts the information to the neighboring nodes. , To achieve the synchronization of the entire network message, and for invalid information, the node will not perform any forwarding operation. The function of immutable and traceable blockchain product information is realized through node verification.
在一个实施例中,商品标识包括设置在商品标识表面的二维码,和/或设置在商品标识内部的NFC芯片和/或RFID芯片,所述商品标识与商品相绑定二维码、所述NFC芯片和所述RFID芯片中均包含商品的防伪溯源结果数据和加密信息数据。In one embodiment, the product identification includes a two-dimensional code provided on the surface of the product identification, and / or an NFC chip and / or an RFID chip provided inside the product identification, and the product identification is bound to the product with the two-dimensional code, Both the NFC chip and the RFID chip include anti-counterfeit traceability result data and encrypted information data of the commodity.
商品标识包括设置在商品标识表面的二维码,和/或设置在商品标识内部的NFC芯片和/或RFID芯片,所述商品标识与商品相绑定二维码、所述NFC芯片和所述RFID芯片中均包含商品的防伪溯源结果数据和加密信息数据。NFC近场通信(Near Field Communication,NFC),是一种短距离的高频无线通信技术,允许电子设备之间进行非接触式点对点数据传输交换数据。NFC近距离无线通信,其中NFC芯片是NFC模块中的重要组成部分,具有通信功能和一定的计算能力,一些型号甚至含有加密逻辑电路以及加密/解密模块。NFC可允许电子设备互相进行非接触式的点对点数据传输。这个技术由非接触式射频识别技术RFID演变而来,同时向下兼容RFID技术。由于具备较高的安全性,因此NFC技术在移动支付方面有很大的应用。NFC技术就是把RFID读卡器与RFID卡的功能整合在一起,并对RFID设备提供兼容。RFID(Radio Frequency Identification)技术,即无线射频识别,是一种通信技术,可通过无线电讯号识别特定目标并读写相关数据,而无需识别系统与特定目标之间建立机械或光学接触。RFID设备已被应用到非常多的领域如IC卡门禁系统以及公交卡都是RFID技术的产物。二维码(2-dimensional bar code)是用特定的几何图形按一定规律在平面(二维方向上)分布的黑白相间的图形记录数据符号信息的,在代码编制上利用构成计算机内部逻辑基础的“0”、“1”比特流的概念,使用若干个与二进制相对应的几何形体来表示文字数值信息,通过图象输入设备或光电扫描设备自动识读以实现信息自动处理,每个字符占有一定的宽度;具有一定的校验功能等,同时还具有对不同行的信息自动识别功能、及处理图形旋转变化点。The product identification includes a two-dimensional code provided on the surface of the product identification, and / or an NFC chip and / or an RFID chip provided inside the product identification, and the product identification is bound to the product with the two-dimensional code, the NFC chip and the The RFID chip contains the anti-counterfeit traceability result data and encrypted information data of the commodity. NFC (Near Field Communication) is a short-range high-frequency wireless communication technology that allows non-contact point-to-point data transmission between electronic devices to exchange data. NFC short-range wireless communication, in which the NFC chip is an important part of the NFC module, which has communication functions and certain computing capabilities. Some models even include encryption logic circuits and encryption / decryption modules. NFC allows electronic devices to perform contactless point-to-point data transfers with each other. This technology evolved from the non-contact RFID technology, and is backward compatible with RFID technology. Because of its high security, NFC technology has great applications in mobile payments. NFC technology is to integrate the function of RFID card reader and RFID card, and provide compatibility for RFID devices. RFID (Radio Frequency Identification) technology, or radio frequency identification, is a communication technology that can identify specific targets and read and write related data through radio signals, without the need to establish mechanical or optical contact between the identification system and the specific targets. RFID equipment has been applied to many fields such as IC card access control systems and bus cards are the products of RFID technology. Two-dimensional code (2-dimensional bar code) records data symbol information with black and white graphics that are distributed on a plane (in a two-dimensional direction) with a certain geometric figure according to a certain rule. The code is used to form the internal logic basis of the computer The concept of "0" and "1" bitstreams uses several geometric shapes corresponding to binary to represent text numerical information. It is automatically read by image input equipment or photoelectric scanning equipment to realize automatic information processing. Each character occupies A certain width; it has a certain verification function, etc. At the same time, it also has an automatic recognition function for different rows of information, and handles the rotation point of graphics.
在一个实施例中,商品信息包括厂商、仓储、转运、流通、配送、转手以 及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。In one embodiment, the product information includes manufacturer, warehousing, transshipment, distribution, distribution, transfer, and maintenance information. The manufacturer information includes manufacturer authorization and time information. The transfer information is used to check loading information and the maintenance information. Record maintenance or separate usage information according to the maintenance phase.
商品信息包括厂商、仓储、转运、流通、配送、转手以及维修信息,厂商信息包括厂商授权和时间信息,转运信息用于核对装车信息,维修信息记录维修或者按照维保阶段分别记录使用信息。商品信息管理是将信息、运输、仓储、库存、装卸搬运以及包装等物流活动综合起来的一种新型的集成式管理,其主要任务是尽可能的降低物流成本,为客户提供更为高效和便捷的服务,具体业态类型越来越多样化,包括运输、仓储、装卸搬运、包装、流通加工、物流信息处理等多样的功能。Product information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information. Manufacturer information includes manufacturer authorization and time information. Transshipment information is used to check loading information, maintenance information records maintenance, or records usage information separately according to the maintenance stage. Product information management is a new type of integrated management that integrates logistics activities such as information, transportation, warehousing, inventory, loading and unloading, and packaging. Its main task is to reduce logistics costs as much as possible and provide customers with more efficiency and convenience. Services, specific business types are becoming more and more diversified, including various functions such as transportation, warehousing, loading and unloading, packaging, distribution processing, and logistics information processing.
如图5所示,在一个实施例中,提供了一种基于区块链的防伪系统,所述基于区块链的防伪系统包括:As shown in FIG. 5, in one embodiment, a blockchain-based anti-counterfeiting system is provided. The blockchain-based anti-counterfeiting system includes:
预置单元,设置为预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;The preset unit is configured to preset a product identifier, which is used as a data collector of the blockchain to record and monitor product information;
存储加密单元,设置为采用区块链在数据层对所述商品信息进行存储和加密;A storage encryption unit configured to store and encrypt the commodity information at a data layer using a blockchain;
交互验证单元,设置为通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;The interaction verification unit is configured to realize interaction between nodes through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending a message, and is established at the blockchain network layer Node-to-node consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification;
共识单元,设置为通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;A consensus unit is set up to promote consensus among nodes on the blockchain consensus layer through a proof-of-work mechanism, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
查看单元,设置为接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。The viewing unit is configured to receive a product information viewing request sent by the user terminal, where the product information includes a product identifier of the product, and return the product information to the user terminal.
在一个实施例中,所述商品标识包括设置在商品标识表面的二维码,和/或设置在商品标识内部的NFC芯片和/或RFID芯片,所述商品标识与商品相绑定二维码、所述NFC芯片和所述RFID芯片中均包含商品的防伪溯源结果数据和加密信息数据。In one embodiment, the product identifier includes a two-dimensional code provided on a surface of the product identifier, and / or an NFC chip and / or an RFID chip provided inside the product identifier, and the product identifier is bound to the product by the two-dimensional code. Both the NFC chip and the RFID chip include anti-counterfeit traceability result data and encrypted information data of commodities.
在一个实施例中,所述商品信息包括厂商、仓储、转运、流通、配送、转 手以及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。In one embodiment, the product information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information, the manufacturer information includes manufacturer authorization and time information, and the transfer information is used to check loading information, the Maintenance information records maintenance or separate usage information according to the maintenance phase.
在一个实施例中,所述存储加密单元还包括:In one embodiment, the storage encryption unit further includes:
采集传输模块,设置为通过终端检测商品标识,将采集商品信息传输到区块链的数据层;The collection and transmission module is configured to detect the product identification through the terminal and transmit the collected product information to the data layer of the blockchain;
封装模块,设置为使分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验;The encapsulation module is configured to make the distributed ledger database encapsulate the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block body. The block body includes all Transaction information, the block header includes a hash value, a timestamp, and a Merkel tree root hash value, the timestamp records the block generation time, and the Merkel tree verifies the transaction;
加解密模块,设置为通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码。The encryption and decryption module is configured to encrypt and decrypt data by using a public encryption key and a private key of an asymmetric encryption algorithm. Each product identifier includes a private key, and the private key is a password for viewing the product identifier.
在其中一个实施例中,所述采集传输模块,包括:产品信息数据采集模块,设置为通过NFC芯片、RFID或者二维码识别产品信息数据;产品信息数据传输模块,设置为将所述识别出的信息数据传输到区块链的数据层。In one embodiment, the acquisition and transmission module includes: a product information data acquisition module configured to identify product information data through an NFC chip, RFID or two-dimensional code; and a product information data transmission module configured to identify the identified information. The information data is transmitted to the data layer of the blockchain.
在一个实施例中,所述交互验证单元还包括:In one embodiment, the interactive verification unit further includes:
广播模块,设置为使节点将收到的数据记录通过P2P网络广播到去中心化服务器中的其他记账节点,等待其他记账节点的确认;A broadcasting module configured to enable a node to broadcast received data records to other accounting nodes in a decentralized server through a P2P network, and wait for confirmation from other accounting nodes;
验证模块,设置为当每个节点收到临近节点传来的消息时,对数据的有限性进行验证,若为有效信息,所述节点将该有效信息向临近的节点进行广播,若为无效信息,所述,所述节点不进行任何转发操作。The verification module is configured to verify the finiteness of the data when each node receives a message from a neighboring node. If it is valid information, the node broadcasts the valid information to neighboring nodes, and if it is invalid information It is said that the node does not perform any forwarding operation.
在一个实施例中,提出了一种计算机设备,所述计算机设备包括存储器和处理器,存储器中存储有计算机可读指令,计算机可读指令被处理器执行时,使得处理器执行上述各实施例中的所述基于区块链技术的防伪方法的步骤。In one embodiment, a computer device is provided. The computer device includes a memory and a processor. The memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the processor causes the processor to execute the foregoing embodiments. Steps in the anti-counterfeiting method based on blockchain technology.
在一个实施例中,提出了一种存储有计算机可读指令的存储介质,该计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行上述各实施例中的所述基于区块链技术的防伪方法的步骤。其中,所述存储介质可以为非易失性存储介质。In one embodiment, a storage medium storing computer-readable instructions is provided. When the computer-readable instructions are executed by one or more processors, the one or more processors are caused to execute all the steps in the foregoing embodiments. The steps of the anti-counterfeiting method based on blockchain technology are described. The storage medium may be a non-volatile storage medium.
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:只读存储器(ROM,Read Only Memory)、随 机存取存储器(RAM,Random Access Memory)、磁盘或光盘等。A person of ordinary skill in the art may understand that all or part of the steps in the various methods of the foregoing embodiments may be implemented by a program instructing related hardware. The program may be stored in a computer-readable storage medium. The storage medium may include: Read-only memory (ROM, Read Only Memory), random access memory (RAM, Random Access Memory), magnetic disks or optical disks, etc.
以上所述实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the embodiments described above can be arbitrarily combined. In order to make the description concise, all possible combinations of the technical features in the above embodiments have not been described. However, as long as there is no contradiction in the combination of these technical features, It should be considered as the scope described in this specification.
以上所述实施例仅表达了本申请一些示例性实施例,其描述较为具体和详细,但并不能因此而理解为对本申请专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above-mentioned embodiments only express some exemplary embodiments of the present application, and their descriptions are more specific and detailed, but cannot be understood as a limitation on the scope of the patent of the present application. It should be noted that, for those of ordinary skill in the art, without departing from the concept of the present application, several modifications and improvements can be made, and these all belong to the protection scope of the present application. Therefore, the protection scope of this application patent shall be subject to the appended claims.

Claims (20)

  1. 一种基于区块链的防伪方法,包括:A blockchain-based anti-counterfeiting method includes:
    预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;Preset product identification, which is used as a data collector of the blockchain to record and monitor product information;
    采用区块链在数据层对所述商品信息进行存储和加密;Using a blockchain to store and encrypt the commodity information at the data layer;
    通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;Interaction between nodes is achieved through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending messages, and establishes a node-to-node relationship at the blockchain network layer. Consensus mechanism to provide decentralization for digital content interaction and provide guarantee for data point-to-point transmission verification;
    通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;Promote each node to reach consensus at the blockchain consensus layer through the proof-of-work mechanism, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is the data recorded by a node when it records data Need to obtain the approval of most nodes in the blockchain in order to be recorded in each node of the blockchain;
    接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。Receiving a commodity information viewing request sent by a user terminal, where the commodity information includes a commodity identifier of the commodity, and returning the commodity information to the user terminal.
  2. 根据权利要求1所述的基于区块链的防伪方法,其中,所述采用区块链在数据层对所述商品信息进行存储和加密包括:The anti-counterfeiting method based on the blockchain according to claim 1, wherein storing and encrypting the commodity information in the data layer by using the blockchain comprises:
    通过终端检测商品标识采集商品信息,并将所述商品信息传输到区块链的数据层;Collect product information by detecting the product identifier through the terminal, and transmit the product information to the data layer of the blockchain;
    分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验;The distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block body. The block body includes all transaction information. The block header includes A hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time, and the Merkel tree verifies a transaction;
    通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码。The data is encrypted and decrypted by the public and private keys of the asymmetric encryption algorithm, and each product identifier contains a private key, which is the password for viewing the product identifier.
  3. 根据权利要求2所述的基于区块链的防伪方法,其中,所述通过终端检测商品标识采集商品信息,并将所述商品信息传输到区块链的数据层,包括:The anti-counterfeiting method based on the blockchain according to claim 2, wherein the collecting commodity information by detecting the product identifier through the terminal and transmitting the commodity information to the data layer of the blockchain comprises:
    通过NFC芯片、RFID或者二维码识别产品信息数据;Identify product information data through NFC chip, RFID or two-dimensional code;
    将所述识别出的信息数据传输到区块链的数据层。The identified information data is transmitted to a data layer of a blockchain.
  4. 根据权利要求1所述的基于区块链的防伪方法,其中,所述通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障包括:The anti-counterfeiting method based on the blockchain according to claim 1, wherein the interaction between nodes is realized through a blockchain network layer, and the blockchain network layer includes a plurality of service nodes, and each service node passes Send messages for interaction, and establish a consensus mechanism between nodes at the blockchain network layer, provide decentralization for digital content interaction, and provide guarantee for data point-to-point transmission verification including:
    节点将收到的数据记录通过P2P网络广播到去中心化服务器中的其他记账节点,等待其他记账节点的确认;The node broadcasts the received data records to other accounting nodes in the decentralized server through the P2P network, and waits for confirmation from other accounting nodes;
    当每个节点收到临近节点传来的消息时,对数据的有限性进行验证,若为有效信息,所述节点将该有效信息向临近的节点进行广播,若为无效信息,所述,所述节点不进行任何转发操作。When each node receives a message from a neighboring node, it verifies the finiteness of the data. If it is valid information, the node broadcasts the valid information to the neighboring nodes. If it is invalid information, the These nodes do not perform any forwarding operations.
  5. 根据权利要求1所述的基于区块链的防伪方法,其中,所述商品标识包括设置在商品标识表面的二维码,和/或设置在商品标识内部的NFC芯片和/或RFID芯片,所述商品标识与商品相绑定二维码、所述NFC芯片和所述RFID芯片中均包含商品的防伪溯源结果数据和加密信息数据。The anti-counterfeiting method based on the blockchain according to claim 1, wherein the product identification comprises a two-dimensional code provided on a surface of the product identification, and / or an NFC chip and / or an RFID chip provided inside the product identification, so that The two-dimensional code that binds the product identification to the product, and the NFC chip and the RFID chip each include anti-counterfeit traceability result data and encrypted information data of the product.
  6. 根据权利要求1所述的基于区块链的防伪方法,其中,所述商品信息包括厂商、仓储、转运、流通、配送、转手以及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。The anti-counterfeiting method based on the blockchain according to claim 1, wherein the commodity information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information, and the manufacturer information includes manufacturer authorization and time information, and The transfer information is used to check the loading information, and the maintenance information records maintenance or separately uses information according to the maintenance stage.
  7. 一种基于区块链的防伪系统,包括:A blockchain-based anti-counterfeiting system includes:
    预置单元,设置为预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;The preset unit is configured to preset a product identifier, which is used as a data collector of the blockchain to record and monitor product information;
    存储加密单元,设置为采用区块链在数据层对所述商品信息进行存储和加密;A storage encryption unit configured to store and encrypt the commodity information at a data layer using a blockchain;
    交互验证单元,设置为通过区块链网络层实现节点之间的交互,所述区块 链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;The interaction verification unit is configured to realize interaction between nodes through a blockchain network layer, which includes a plurality of service nodes, each service node interacts by sending a message, and is established at the blockchain network layer Node-to-node consensus mechanism provides decentralization for digital content interaction and provides guarantee for data point-to-point verification;
    共识单元,设置为通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;A consensus unit is set up to promote consensus among nodes on the blockchain consensus layer through a proof-of-work mechanism, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is when a node records data, The recorded data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain;
    查看单元,设置为接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。The viewing unit is configured to receive a product information viewing request sent by the user terminal, where the product information includes a product identifier of the product, and return the product information to the user terminal.
  8. 根据权利要求7所述的基于区块链的防伪系统,其中,所述存储加密单元还包括:The anti-counterfeiting system based on the blockchain according to claim 7, wherein the storage encryption unit further comprises:
    采集传输模块,设置为通过终端检测商品标识采集商品信息,并将所述商品信息传输到区块链的数据层;A collection and transmission module configured to collect product information by detecting a product identifier through a terminal, and transmit the product information to a data layer of a blockchain;
    封装模块,设置为使分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验;The encapsulation module is configured to make the distributed ledger database encapsulate the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block body. The block body includes all Transaction information, the block header includes a hash value, a timestamp, and a Merkel tree root hash value, the timestamp records the block generation time, and the Merkel tree verifies the transaction;
    加解密模块,设置为通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码。The encryption and decryption module is configured to encrypt and decrypt data by using a public encryption key and a private key of an asymmetric encryption algorithm. Each product identifier includes a private key, and the private key is a password for viewing the product identifier.
  9. 根据权利要求8所述的基于区块链的防伪系统,其中,所述采集传输模块,包括:The blockchain-based anti-counterfeiting system according to claim 8, wherein the acquisition and transmission module comprises:
    产品信息数据采集模块,设置为通过NFC芯片、RFID或者二维码识别产品信息数据;Product information data acquisition module, set to identify product information data through NFC chip, RFID or two-dimensional code;
    产品信息数据传输模块,设置为将所述识别出的信息数据传输到区块链的数据层。The product information data transmission module is configured to transmit the identified information data to a data layer of a blockchain.
  10. 根据权利要求7所述的基于区块链的防伪系统,其中,所述交互验证 单元还包括:The blockchain-based anti-counterfeiting system according to claim 7, wherein the interactive verification unit further comprises:
    广播模块,设置为使节点将收到的数据记录通过P2P网络广播到去中心化服务器中的其他记账节点,等待其他记账节点的确认;A broadcasting module configured to enable a node to broadcast received data records to other accounting nodes in a decentralized server through a P2P network, and wait for confirmation from other accounting nodes;
    验证模块,设置为当每个节点收到临近节点传来的消息时,对数据的有限性进行验证,若为有效信息,所述节点将该有效信息向临近的节点进行广播,若为无效信息,所述,所述节点不进行任何转发操作。The verification module is configured to verify the finiteness of the data when each node receives a message from a neighboring node. If it is valid information, the node broadcasts the valid information to neighboring nodes, and if it is invalid information It is said that the node does not perform any forwarding operation.
  11. 根据权利要求7所述的基于区块链的防伪系统,其中,所述商品标识包括设置在商品标识表面的二维码,和/或设置在商品标识内部的NFC芯片和/或RFID芯片,所述商品标识与商品相绑定二维码、所述NFC芯片和所述RFID芯片中均包含商品的防伪溯源结果数据和加密信息数据。The anti-counterfeiting system based on blockchain according to claim 7, wherein the product identification comprises a two-dimensional code provided on the surface of the product identification, and / or an NFC chip and / or an RFID chip provided inside the product identification, and The two-dimensional code that binds the product identification to the product, and the NFC chip and the RFID chip each include anti-counterfeit traceability result data and encrypted information data of the product.
  12. 根据权利要求7所述的基于区块链的防伪系统,其中,所述商品信息包括厂商、仓储、转运、流通、配送、转手以及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。The anti-counterfeiting system based on the blockchain according to claim 7, wherein the commodity information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information, and the manufacturer information includes manufacturer authorization and time information, and The transfer information is used to check the loading information, and the maintenance information records maintenance or separately uses information according to the maintenance stage.
  13. 一种计算机设备,包括存储器和处理器,所述存储器中存储有计算机可读指令,所述计算机可读指令被所述处理器执行时,使得所述处理器执行以下步骤:预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;采用区块链在数据层对所述商品信息进行存储和加密;通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。A computer device includes a memory and a processor. The memory stores computer-readable instructions. When the computer-readable instructions are executed by the processor, the processor causes the processor to perform the following steps: preset product identification, The commodity identifier is used as a data collector for the blockchain to record and monitor commodity information; the blockchain is used to store and encrypt the commodity information at the data layer; and to implement interaction between nodes through the blockchain network layer. The blockchain network layer includes multiple service nodes. Each service node interacts by sending messages, and a consensus mechanism between nodes is established at the blockchain network layer to provide decentralization for digital content interaction and data. Point-to-point transmission verification is provided to provide guarantee; through the proof-of-work mechanism at the blockchain consensus layer, nodes are promoted to reach consensus, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is that a node is recording data In order to be recorded, the recorded data needs to be approved by most nodes in the blockchain. Each node in block chains; commodity information sent by the user terminal receives a request to view the product information including commodity goods identification, the terminal returns the user to the product information.
  14. 根据权利要求13所述的一种计算机设备,其中,所述采用区块链在数据层对所述商品信息进行存储和加密时,使得所述处理器执行以下步骤:The computer device according to claim 13, wherein when the commodity information is stored and encrypted at a data layer by using a blockchain, the processor is caused to perform the following steps:
    通过终端检测商品标识采集商品信息,并将所述商品信息传输到区块链的数据层;Collect product information by detecting the product identifier through the terminal, and transmit the product information to the data layer of the blockchain;
    分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验;The distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block body. The block body includes all transaction information. The block header includes A hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time, and the Merkel tree verifies a transaction;
    通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码。The data is encrypted and decrypted by the public and private keys of the asymmetric encryption algorithm, and each product identifier contains a private key, which is the password for viewing the product identifier.
  15. 根据权利要求13所述的一种计算机设备,其中,所述商品标识包括设置在商品标识表面的二维码,和/或设置在商品标识内部的NFC芯片和/或RFID芯片,所述商品标识与商品相绑定二维码、所述NFC芯片和所述RFID芯片中均包含商品的防伪溯源结果数据和加密信息数据。The computer device according to claim 13, wherein the product identifier comprises a two-dimensional code provided on a surface of the product identifier, and / or an NFC chip and / or an RFID chip provided inside the product identifier, the product identifier The two-dimensional code that is bound to the product, the NFC chip and the RFID chip all contain anti-counterfeit traceability result data and encrypted information data of the product.
  16. 根据权利要求13所述的一种计算机设备,其中,所述商品信息包括厂商、仓储、转运、流通、配送、转手以及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。The computer equipment according to claim 13, wherein the commodity information includes manufacturer, warehousing, transshipment, distribution, distribution, transfer, and maintenance information, the vendor information includes vendor authorization and time information, and the transfer information is used for In checking the loading information, the maintenance information records maintenance or separately uses information according to the maintenance stage.
  17. 一种存储有计算机可读指令的存储介质,所述计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:预置商品标识,所述商品标识作为区块链的数据采集器,记录和监控商品信息;采用区块链在数据层对所述商品信息进行存储和加密;通过区块链网络层实现节点之间的交互,所述区块链网络层包含复数个服务节点,各服务节点间通过发送消息进行交互,并在区块链网络层建立节点与节点之间的共识机制,为数字内容交互提供去中心化,对数据点对点传输进行验证提供保障;通过工作量证明机制在区块链共识层促进各节点达成共识,分别记录所有上链数据且保持全部数据状态 一致,所述工作量证明机制为某个节点在记录数据时,其所记录的数据需要取得区块链中大部分节点的认同,才能被记录到区块链的各节点中;接收用户终端发送的商品信息查看请求,所述商品信息包括商品的商品标识,向用户终端返回所述商品信息。A storage medium storing computer-readable instructions, when the computer-readable instructions are executed by one or more processors, cause the one or more processors to perform the following steps: preset a product identifier, and the product identifier is used as a zone A blockchain data collector that records and monitors commodity information; uses the blockchain to store and encrypt the commodity information at the data layer; implements interaction between nodes through the blockchain network layer, which is the blockchain network layer Contains multiple service nodes. Each service node interacts by sending messages and establishes a consensus mechanism between nodes at the blockchain network layer. It provides decentralization for digital content interaction and provides guarantee for data point-to-point transmission verification. ; Promote each node to reach consensus at the blockchain consensus layer through the proof-of-work mechanism, record all on-chain data and keep all data states consistent. The proof-of-work mechanism is what a node records when it records data. Data needs to be approved by most nodes in the blockchain before it can be recorded in each node of the blockchain; receive A commodity information viewing request sent by a user terminal, where the commodity information includes a commodity identifier of the commodity, and the commodity information is returned to the user terminal.
  18. 根据权利要求17所述的一种存储有计算机可读指令的存储介质,其中,所述采用区块链在数据层对所述商品信息进行存储和加密时,使得所述一个或多个处理器执行以下步骤:The storage medium storing computer-readable instructions according to claim 17, wherein, when the commodity information is stored and encrypted in a data layer by using a blockchain, the one or more processors are caused Perform the following steps:
    通过终端检测商品标识采集商品信息,并将所述商品信息传输到区块链的数据层;Collect product information by detecting the product identifier through the terminal, and transmit the product information to the data layer of the blockchain;
    分布式账本数据库封装区块链数据结构和加密内容在区块链数据层,区块链的每个区块包括区块头和区块体,所述区块体包括了所有交易信息,区块头包括哈希值、时间戳和默克尔树根哈希值,所述时间戳记录区块生成时间,所述默克尔树对交易进行校验;The distributed ledger database encapsulates the blockchain data structure and encrypted content in the blockchain data layer. Each block of the blockchain includes a block header and a block body. The block body includes all transaction information. The block header includes A hash value, a timestamp, and a Merkel tree root hash value, the timestamp records a block generation time, and the Merkel tree verifies a transaction;
    通过非对称加密算法的公钥和私钥对数据加密和解密,每一个商品标识包含一个私钥,所述私钥是查看商品标识的密码。The data is encrypted and decrypted by the public and private keys of the asymmetric encryption algorithm, and each product identifier contains a private key, which is the password for viewing the product identifier.
  19. 根据权利要求17所述的一种存储有计算机可读指令的存储介质,其中,所述商品信息包括厂商、仓储、转运、流通、配送、转手以及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。The storage medium storing computer-readable instructions according to claim 17, wherein the commodity information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information, and the manufacturer information includes manufacturer authorization and time Information, the transfer information is used to check loading information, and the maintenance information records maintenance or separate usage information according to the maintenance stage.
  20. 根据权利要求17所述的一种存储有计算机可读指令的存储介质,其中,所述商品信息包括厂商、仓储、转运、流通、配送、转手以及维修信息,所述厂商信息包括厂商授权和时间信息,所述转运信息用于核对装车信息,所述维修信息记录维修或者按照维保阶段分别记录使用信息。The storage medium storing computer-readable instructions according to claim 17, wherein the commodity information includes manufacturer, warehousing, transshipment, circulation, distribution, transfer, and maintenance information, and the manufacturer information includes manufacturer authorization and time Information, the transfer information is used to check loading information, and the maintenance information records maintenance or separate usage information according to the maintenance stage.
PCT/CN2018/106690 2018-06-25 2018-09-20 Anti-fake method and system based on block chain, computer device, and storage medium WO2020000707A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810656985.1A CN108985790A (en) 2018-06-25 2018-06-25 Method for anti-counterfeit, system, computer equipment and storage medium based on block chain
CN201810656985.1 2018-06-25

Publications (1)

Publication Number Publication Date
WO2020000707A1 true WO2020000707A1 (en) 2020-01-02

Family

ID=64538539

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/106690 WO2020000707A1 (en) 2018-06-25 2018-09-20 Anti-fake method and system based on block chain, computer device, and storage medium

Country Status (2)

Country Link
CN (1) CN108985790A (en)
WO (1) WO2020000707A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314334A (en) * 2020-02-10 2020-06-19 上海赛艾吉智能科技有限公司 Intelligent block chain platform system based on Internet of things and operation method
CN111475830A (en) * 2020-05-20 2020-07-31 北京邮电大学 Block chain system suitable for commodity traceability scene and working method thereof

Families Citing this family (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111311253A (en) * 2018-12-12 2020-06-19 阿里巴巴集团控股有限公司 Transaction method, device and system based on block chain
CN109711854A (en) * 2018-12-28 2019-05-03 山东超越数控电子股份有限公司 A kind of anti-fake source tracing method and system based on block chain technology
CN111461585B (en) * 2019-01-22 2024-04-16 北京京东振世信息技术有限公司 Inventory management method and device, storage medium and electronic equipment
CN109886685A (en) * 2019-02-28 2019-06-14 易齐盈(重庆)电子商务有限公司 A kind of commodity tracing system and method based on block chain
CN109992998A (en) * 2019-03-31 2019-07-09 杭州复杂美科技有限公司 A kind of information storage means and system, equipment and storage medium
CN110097376A (en) * 2019-04-12 2019-08-06 阿里巴巴集团控股有限公司 Commodity source tracing method, device, equipment and storage medium
CN110213230B (en) * 2019-04-26 2020-01-31 特斯联(北京)科技有限公司 network security verification method and device for distributed communication
CN110111119B (en) * 2019-05-15 2022-10-11 泉州师范学院 Block chain-based shoe and garment anti-counterfeiting system with physical anti-counterfeiting NFC chip and method
CN110378793A (en) * 2019-06-17 2019-10-25 深圳壹账通智能科技有限公司 Data managing method, device, computer equipment and storage medium
CN112116359A (en) * 2019-06-19 2020-12-22 成都帧驰科技有限公司 False tooth verification method, system and device based on block chain network
CN110288064A (en) * 2019-07-04 2019-09-27 江苏前来信息科技有限公司 A kind of RFID product anti-counterfeiting tracing system
CN110378445A (en) * 2019-07-05 2019-10-25 匿名科技(重庆)集团有限公司 A kind of more product code allocation methods of an object
CN110557277A (en) * 2019-07-25 2019-12-10 北京清红微谷技术开发有限责任公司 method and system for searching nearest common ancestor of two blocks in block chain system
CN110569240B (en) * 2019-07-25 2023-04-07 平安科技(深圳)有限公司 Data storage method and device, computer equipment and storage medium
CN110443055B (en) * 2019-08-07 2021-01-01 北京瑞策科技有限公司 Uplink method and device for self-media associated data on Internet
CN110324363B (en) * 2019-08-07 2020-08-14 北京瑞策科技有限公司 Uplink method and device for Internet e-commerce associated data
CN110765146A (en) * 2019-10-21 2020-02-07 深圳市炳德区块链技术有限公司 Block chain-based merchant credit value method, device, node and storage medium thereof
CN110933040B (en) * 2019-11-05 2021-11-12 武汉菲旺软件技术有限责任公司 Block chain based data uplink method, device, equipment and medium
CN111047331A (en) * 2019-11-12 2020-04-21 武汉金运激光股份有限公司 Commodity anti-counterfeiting tracing method and system based on block chain and NFC chip
CN110909808B (en) * 2019-11-27 2022-09-06 京东科技信息技术有限公司 Method, system and device for anti-counterfeiting verification
CN112926972B (en) * 2019-12-05 2024-04-09 中移物联网有限公司 Information processing method based on block chain, block chain system and terminal
CN111400779A (en) * 2020-01-07 2020-07-10 李蕴光 High-dimensional data encryption method and system
CN111311283B (en) * 2020-02-20 2021-02-05 宁波甜宝生物信息技术有限公司 Cosmetic source tracing production process method based on block chain and cloud computing
CN111414415A (en) * 2020-02-26 2020-07-14 北斗(天津)科学技术应用研究院(有限合伙) Decentralized information storage node communication network system and method
CN111404897A (en) * 2020-03-06 2020-07-10 深圳前海达闼云端智能科技有限公司 Message distribution method and device, storage medium and electronic equipment
CN111415157A (en) * 2020-03-28 2020-07-14 贵阳大数据交易所有限责任公司 Block chain-based data asset safety circulation method
CN111652458B (en) * 2020-04-09 2023-09-26 南京审计大学 Engineering auditing method based on blockchain technology
CN111526195A (en) * 2020-04-17 2020-08-11 北斗(天津)科学技术应用研究院(有限合伙) Decentralized information storage node communication network system and method
CN111598567B (en) * 2020-05-07 2023-11-10 深圳创客区块链技术有限公司 Method, device and storage medium for preventing blockchain powerful attack
CN111612964B (en) * 2020-05-21 2021-01-26 广东乐佳印刷有限公司 Bill certificate anti-counterfeiting detection method and device based on block chain
CN111756743B (en) * 2020-06-24 2021-12-14 腾讯科技(深圳)有限公司 Resource transfer method and device based on block chain, computer equipment and storage medium
CN112116360A (en) * 2020-08-14 2020-12-22 宇龙计算机通信科技(深圳)有限公司 Shoe anti-counterfeiting method and device, storage medium and electronic equipment
CN114531260A (en) * 2020-11-09 2022-05-24 腾讯科技(深圳)有限公司 Information processing method based on alliance chain system and related equipment
CN113011975A (en) * 2021-02-22 2021-06-22 西安超越申泰信息科技有限公司 Block chain anti-counterfeiting transaction method supporting national cryptographic algorithm and computer equipment
CN113487201B (en) * 2021-07-14 2022-11-11 海南马良师傅网络科技有限公司 Instrument relocation task distribution system
CN115330419A (en) * 2022-09-07 2022-11-11 张文爱 Anti-counterfeiting verification method and platform based on block chain and computer readable medium
CN115658847B (en) * 2022-10-27 2024-03-26 山东迪海信息科技有限公司 Intellectual property achievement conversion management system based on big data

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407795A (en) * 2016-09-05 2017-02-15 北京众享比特科技有限公司 Data existence authentication system, authentication method and verification method
CN206451233U (en) * 2017-01-20 2017-08-29 深圳市厂家网网络科技有限公司 A kind of commodity based on RFID and Quick Response Code are traced to the source information authentication system
CN108009830A (en) * 2017-12-14 2018-05-08 上海密尔克卫化工储存有限公司 Products in circulation tracking and system based on block chain
CN108364181A (en) * 2018-01-08 2018-08-03 广州中国科学院计算机网络信息中心 Source tracing method and system based on block chain and Internet of Things mark

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9858569B2 (en) * 2014-03-21 2018-01-02 Ramanan Navaratnam Systems and methods in support of authentication of an item
CN106209877A (en) * 2016-07-19 2016-12-07 井创(北京)科技有限公司 A kind of be certification core with block chain backstage false-proof authentication system
CN107169776A (en) * 2017-05-10 2017-09-15 无锡井通网络科技有限公司 Product certification method for anti-counterfeit based on block chain technology

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106407795A (en) * 2016-09-05 2017-02-15 北京众享比特科技有限公司 Data existence authentication system, authentication method and verification method
CN206451233U (en) * 2017-01-20 2017-08-29 深圳市厂家网网络科技有限公司 A kind of commodity based on RFID and Quick Response Code are traced to the source information authentication system
CN108009830A (en) * 2017-12-14 2018-05-08 上海密尔克卫化工储存有限公司 Products in circulation tracking and system based on block chain
CN108364181A (en) * 2018-01-08 2018-08-03 广州中国科学院计算机网络信息中心 Source tracing method and system based on block chain and Internet of Things mark

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111314334A (en) * 2020-02-10 2020-06-19 上海赛艾吉智能科技有限公司 Intelligent block chain platform system based on Internet of things and operation method
CN111475830A (en) * 2020-05-20 2020-07-31 北京邮电大学 Block chain system suitable for commodity traceability scene and working method thereof

Also Published As

Publication number Publication date
CN108985790A (en) 2018-12-11

Similar Documents

Publication Publication Date Title
WO2020000707A1 (en) Anti-fake method and system based on block chain, computer device, and storage medium
CN106982203B (en) Robust ATM network system based on block chain technology and information processing method thereof
US20190034923A1 (en) Secure and confidential custodial transaction system, method and device using zero-knowledge protocol
US9858569B2 (en) Systems and methods in support of authentication of an item
WO2019161774A1 (en) Methods, application server, block chain node and media for logistics tracking and source tracing
JP2022514784A (en) Methods and systems for preparing and performing object authentication
WO2016090095A1 (en) Cryptographic verification of provenance in a supply chain
CN104217327A (en) Financial IC (integrated circuit) card Internet terminal and trading method thereof
CN109905351B (en) Method, device, server and computer readable storage medium for storing data
CN110336779B (en) Block chain construction method and device and electronic equipment
CN112395353A (en) Intelligent electric energy meter quality data sharing method and system based on alliance chain
WO2018227685A1 (en) Method and system for secure access of terminal device to internet of things
CN103957186A (en) Method for effectively transferring label ownership in RFID system
Qi et al. Secure and private RFID-enabled third-party supply chain systems
EP2922236B1 (en) Authentication by use of symmetric and asymmetric cryptography
CN111414430A (en) Commodity information management method based on block chain, electronic device and storage medium
CN114186653B (en) Method, device, equipment and storage medium for performing logistics electronic contract
Yu et al. Blockchain technology for the 5g-enabled internet of things systems: Principle, applications and challenges
CN110225028A (en) A kind of distribution anti-counterfeiting system and its method
CN102332068A (en) On-line logistics encryption, authentication and storage system using universal serial bus key (USBKEY)
CN109800597A (en) The merchandise news encryption method anti-fake for luxury goods
CN204066182U (en) A kind of financial IC card internet terminal
TWI710243B (en) Device and method for distributing machine id, and internet-connected device
He et al. Design of anti-counterfeiting system based on blockchain and NFC tag
WO2020121265A1 (en) System, device and method for securely transferring information from a hardware to a blockchain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18924275

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18924275

Country of ref document: EP

Kind code of ref document: A1